The SecurityArchitectwill work across the IT Infrastructure Services organization and will be responsible for planning, designing, testing, implementing and maintaining Qorvos computer, server, cloud and network security infrastructure.
Responsibilities:
Serve as the senior subject matter expert on Qorvo information technology security```{=html}
```- Define, Design, build, implement and support enterprise-class security systems
```{=html}
```- Coordinate with the CISO and Information Security Committee to align organizational security strategy and infrastructure with overall business and technology strategy
```{=html}
```- Identify and communicate current and emerging security threats
```{=html}
```- Design security architecture elements to mitigate threats
```{=html}
```- Plan, research and design robust security architectures for any IT project
```{=html}
```- Mentor a broad-range of IT professionals to expand the secure-by-design" mindset
```{=html}
```- Create solutions that balance business requirements with information and cybersecurity requirements
```{=html}
```- Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
```{=html}
```- Review and approve installation of core infrastructure services such as firewall, VPN, routers, servers, clients, and saas and cloud systems
```{=html}
```- Use current programming language and technologies to standardize solutions, and automate when possible.
```{=html}
```- Define, implement and maintain corporate information security procedures in alignment with policies and standards
```{=html}
```- Participate as a key memebr of the cyber security incident response team providing thorough remedial solutions and analysis
```{=html}
```- Regularly communicate vital information, security needs and priorities to upper management
Required Professional Experience:
Utilizing emerging technologies to design and implement security solutions; monitoring and improving those solutions through collaboration with other IT and business stakeholders```{=html}
```- Consulting and engineering in the design and development of security best practices; implementation of security measures to meet business goals, customer needs and regulatory requirements
```{=html}
```- Security management of on-premise and cloud computing, including data breaches, hacking, account hijacking, malicious insiders, third parties, authentication, APTs, data loss and DoS attacks
```{=html}
```- Identity and access management; tracking and creating/enforcing policies that govern access to sensitive technology resources and information
```{=html}
```- Outstanding communication skills; strong critical thinking and analytical skills
```{=html}
```- Strong leadership, project and team-building skills
```{=html}
```- Demonstrated ability to identify risks associated with business processes, operations, technology projects and information security programs
```{=html}
```- Ability to function as an enterprise security subject matter expert who can explain complex topics to those without a technical background
```{=html}
```- Formal process improvement and/or project management experience
```{=html}
```- Experience documenting system security plans from an enterprise level down to individual system configuration level
Preferred Professional Experience:
Windows, UNIX and Linux operating systems```{=html}
```- VB.NET, Java/J2EE, ColdFusion, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle
```{=html}
```- General understanding of relevant industry security standards and protocols including one or more of ISO27001/2 and National Insti ute of Standards and Technology (NIST) security frameworks (e.g., 800-171, 800-53, CSF);
```{=html}
```- Router, switch and VLAN security; wireless security
```{=html}
```- Experience securing a hybrid environment consisting of legacy operational technology (manufacturing systems, ICS, OT), enterprise IT systems, and cloud computing resources.
```{=html}
```- Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security threat analysis
```{=html}
```- Relevant industry technology and security certifications are also preferred
Qorvo will not sponsor job applicants for visas or work authorizations for this position.
MAKE A DIFFERENCE AT QORVO
We are Qorvo. We do more than create innovative RF and Power solutions for the mobile, defense and infrastructure markets - we are a place to innovate and shape the future of wireless communications. It starts with our employees. As a unified global team, we bring a commitment to excellence, growth and a passion for creating what's next. Explore the possibilities with us.
We are an Equal Employment Opportunity (EEO) / Affirmative Action employer and welcome all qualified applicants. Applicants will receive fair and impartial consideration without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, military or veteran status, physical or mental disability, genetic information, and/or any other status protected by law.